[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.x before 4.0.22, 4.1.x before 4.1.30, 4.2.x before 4.2.20 or 4.3.x before 4.3.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to core. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability ...

The host is installed with Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.x before 4.0.22, 4.1.x before 4.1.30, 4.2.x before 4.2.20 or 4.3.x before 4.3.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to core. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability ...

The host is installed with Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.x before 4.0.28, 4.1.x before 4.1.36, 4.2.x before 4.2.28 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Core. Successful exploitation could allow local users to affect availability.

The host is installed with Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.x before 4.0.28, 4.1.x before 4.1.36, 4.2.x before 4.2.28 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Core. Successful exploitation could allow local users to affect availability.

A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could ...

The host is installed with VMWare Tools 10.x before 10.3.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle the issue in HGFS. Successful exploitation may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs.

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to an out-of-bounds vulnerability. The application fails to handle an issue in the vertex shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create ...

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to multiple out-of-bounds read vulnerabilities. The application fails to handle an issue in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crea ...

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to an out-of-bounds read vulnerability. The application fails to handle an issue in the 3D-acceleration feature. Successful exploitation of this issue may lead to information disclosure.

The host is installed with VMWare Tools 10.2.x or 10.3.x before 10.3.10 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle the issue in vm3dmp driver. Successful exploitation may allow an attacker to leak kernel information or create a denial of service attack on the Windows guest machine.


Pages:      Start    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    ..   1502

© SecPod Technologies